Level of Implementation of Security Protocols and Clients’ Satisfaction on Physical Security in an Establishment Towards Enhanced Safety Regulations


Authors : Alexander T. Gendoma

Volume/Issue : Volume 10 - 2025, Issue 12 - December


Google Scholar : https://tinyurl.com/3r9jbzzv

Scribd : https://tinyurl.com/4xwkc9z3

DOI : https://doi.org/10.38124/ijisrt/25dec461

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : Various challenges have been identified when it comes to the physical security practices being implemented in the area. In terms of access control, the main issue comes in dealing the people, including employees, who are trying to access important systems or information without permission. On the other hand, when it comes to security assessment, the main problem is keeping up with online threats that constantly change from time to time. This study evaluates physical security practices, focusing on access control, security assessment, and surveillance, to determine their effectiveness in ensuring safety. The findings reveal high overall satisfaction with security measures, scoring an average, particularly for identification protocols and ID management. Security assessment practices also received a lower rating of underscoring the need for enhancement. The demographic profile of respondents shows a predominantly young workforce, with most aged 25-34 and a balanced gender distribution. The majority of respondents have significant work experience, while educational levels vary, with a notable proportion having some college education. This suggests a generally experienced and diverse workforce. Clients report high satisfaction with security measures, especially advanced locks, effective lighting, and video surveillance. Nevertheless, improvements are needed in entrance point security and perimeter surveillance. The study finds no significant impact of age, gender, length of service, or education on security practices, indicating uniform training and organizational culture as evidenced by the non-significant differences. To address the identified issues, an action plan is developed based on best practices. This plan includes recommendations for enhancing training programs, upgrading access control systems, implementing regular security audits, and improving communication channels for feedback. This structured approach aims to refine security practices and ensure continuous improvement in response to evolving security challenges. Lastly, for the surveillance and monitoring aspects, maintaining protection and privacy is still one of the main concerns as it involves protecting everyone’s privacy. Adopting a comprehensive security approach is recommended based on the indicated issues in physical security practice.

Keywords : Client Satisfaction, Physical Security, Model of Best Practice.

References :

  1. AlertMedia (2023). Conduct a Physical Security Assessment in 5 Steps. https://www.alertmedia.com/blog/physical-security-assessment/
  2. Al Fedaghi, S. & Alsumait, O. (2019). Towards a conceptual foundation for physical security: case study of an IT department. International Journal of Safety and Security Engineering, 9(2), 137 – 156. doi: 10.2495/SAFE-V9-N2-137-156
  3. Aydinan, J. J. B. (2023). Higher Education Institutions Security Capability the Leads to the Creation of Standardized Campus Security System. Journal for Educators, Teachers, and Trainers, 14(2), 356-369.
  4. Britannica, T. Editors of Encyclopaedia (2023). Subic Bay. Encyclopedia Britannica. https://www.britannica.com/place/Subic-Bay
  5. Brooks, D. J. (2022). Intrusion Detection Systems in Physical Security. The Handbook of Security, 681 – 703. https://doi.org/10.1007/978-3-030-91735-7_32
  6. Burton, F. (2021). Physical Security Threats and Office Reopenings: Four Issues Every CEO Needs To Plan For Now. Forbes. https://www.forbes.com/sites/forbestechcouncil/2021/07/14/physical-security-threats-and-office-reopenings-four-issues-every-ceo-needs-to-plan-for-now/?sh=4e85343d6069
  7. Cobb, M. (2021, April 13). Physical Security. TechTarget. https://www.techtarget.com/searchsecurity/definition/physical-security
  8. Coole, M. P. & Brooks, D. J. (2019). Physical Security: Best Practices. Encyclopedia of Security and Emergency Management, 1 – 9. https://doi.org/10.1007/978-3-319-69891-5_220-1
  9. CorpSecurity Team (2021). How Important are Security Guards? https://corpsecurity.org/how-important-are-security-guards/
  10. De La Cruz, C. I. (2021). The Philippines Has Been Named Least Safe Country in the World. Spot. Ph. https://www.spot.ph/newsfeatures/the-latest-news-features/86730/philippines-safety-index-last-world-safest-countries-a833-20210708
  11. Deloitte (2022). Physical Security: The Shift in Perspective. https://www.deloitte.com/global/en/services/risk-advisory/blogs/physical-security-the-shift-in-perspective.html
  12. DotNek (2022). What are the three important components of physical security? https://www.dotnek.com/Blog/Security/what-are-the-three-important-components-of-physical-security
  13. DMAC Security (2021). 10 Physical Security Measures Every Organization Should Take. https://dmacstrategic.com/10-physical-security-measures-every-organization-should-take
  14. DSC (2019, December 13). Corporate Physical Security Best Practices. https://www.thinkdsc.com/blog/corporate-physical-security-best-practices
  15. EC-Council (2022). What is Incident Management and What Are Its Advantages? https://www.eccouncil.org/cybersecurity-exchange/incident-handling/what-is-incident-management-response/
  16. Egnyte (2021). Unauthorized Access: Prevention Best Practices. https://www.egnyte.com/guides/governance/unauthorized-access
  17. ELID Technology Intl. Inc. (2018). Reasons Why Businesses Should Invest in Security Systems in the Philippines. https://elid.com.ph/security-systems-philippines/
  18. Fay, J. J., & Patterson, D. (2018). Contemporary Security Management. doi: 10.1016/C2015-0-04732-3
  19. Federal Trade Commission (n.d). Physical Security. https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/physical-security
  20. Ferdinando, J. (n.d.). Security is more important than ever. Building Security Services & Systems. https://www.buildingsecurity.com/blog/importance-of-the-security-industry/
  21. GeeksforGeeks (2020). Introduction to Physical Security. https://www.geeksforgeeks.org/introduction-to-physical-security/
  22. Gill, M., Howell, C., McGreer, C., & Ramm, J. (2019). The Evolution of Physical Security Measures: assessing the benefits and implications of using more advances technologies. https://perpetuityresearch.com/wp-content/uploads/2019/10/Evolution-of-physical-security-measures-Final-Report-.pdf
  23. Goulding, C. R. (2021). Physical Security R&D Tax Credits. Journal of Physical Security, Journal of Physical Security, 14(1), 1 – 9. https://rbsekurity.com/JPS%20Archives/JPS_14(1).pdf
  24. Hamamoto, A. (2022). Social Impacts of Infrastructure Construction: Sociological Approaches to Development. Sustainable Development Disciplines for Humanity, 85 – 98. doi: 10.1007/978-981-19-4859-6 6
  25. Hutter, D. (2021). Physical security and why it is important. https://sansorg.egnyte.com/dl/MEttXe0pg2
  26. Hyperproof (2022). Internal Controls and Data Security: How to Develop Controls That Meet Your IT Security Needs. https://hyperproof.io/resource/internal-controls-and-data-security/
  27. Isnaini, K. & Solikhatin, S. A. (2020). Information security analysis on physical security in university x using maturity model. Jurnal Informatika, 14(2), 76 – 84. doi: 10.26555/jifo.v14i2.a14434
  28. Kisi. (n.d.). Everything you need to know about physical security. https://www.getkisi.com/overview/physical-security
  29. Johnston, R.G. (2020). Security assurance. Journal of Physical Security, 13 (1), 2 – 4. https://rbsekurity.com/JPS%20Archives/JPS_13(1).pdf
  30. Johnston, R.G. (2019). Design Reviews Versus Vulnerability Assessments for Physical Security. Journal of Physical Security, 12 (3), 30 – 32. https://rbsekurity.com/JPS%20Archives/JPS%2012(3).pdf
  31. Lake, K. (2022). What are the Different Types of Access Control? Jumpcloud. https://jumpcloud.com/blog/different-types-access-control
  32. LeTellier, V. (2019). How to Use the Attacker Mentality for Good. ASIS. https://www.asisonline.org/security-management-magazine/articles/2019/09/how-to-use-the-attacker-mentality-for-good/
  33. Litche, D., Witte, D., Termin, T. & Wolf, K.D. (2021). Representing Uncertainty in Physical Security Risk Assessment. European Journal for Security Research, 6, 189 – 209. https://doi.org/10.1007/s41125-021-00075-3
  34. Lutkevich, B. (2022). access control. TechTarget. https://www.techtarget.com/searchsecurity/definition/access-control
  35. Mabanglo, J.K.L. (2020). Campus Security Practices” Assessment of Philippine College of Science And Technology. International Journal of Advanced Research and Publications, 4(4), 14 – 19. https://www.researchgate.net/publication/351481393_Campus_Security_Practices_Assessment_Of_Philippine_College_Of_Science_And_Technology
  36. Maxsenti, M. (2021). What is Physical Security? Overview & How to Reduce Risk. Genea. https://www.getgenea.com/blog/physical-security/
  37. Miller, B. (2022). 12 Tips for Improving Access Control in Your Organization. Cyber Defense Magazine. https://www.cyberdefensemagazine.com/12-tips-for-improving/
  38. Milkovski, I. (2021). Physical Security System Components. LinkedIn. https://www.linkedin.com/pulse/physical-security-system-components-igor-milkovski-ma/
  39. Mishra, A. (2023). Effective Physical Security Protocols 2023. CorpSecurity Team. https://corpsecurity.org/effective-physical-security/
  40. Morgan, A., & Dowling, C. (2021). Physical Security: Video Surveillance, Equipment, and Training. Encyclopedia of Securiy and Management, 766 – 775. doi: 10.1007/978-3-319-70488-3_222
  41. National Center for Education Statistics. (n.d). Chapter 5-protecting your system: physical security, from safeguarding your technology”. NCES publication, 98-297 https://nces.ed.gov/pubs98/safetech/chapter5.asp
  42. National Protective Security Authority (2023). Intrusion Detection. https://www.cpni.gov.uk/intrusion-detection
  43. Neumetric (2022). What are Security Assessments? https://www.neumetric.com/security-assessment/
  44. Nikolopoulou, K. (2022, August 09). What is Convenience Sampling? Definition & Examples. Scribbr. https://www.scribbr.com/methodology/convenience-sampling/#:~:text=Convenience%20sampling%20is%20a%20non,to%20participate%20in%20the%20research.
  45. Nizhebetskyi, D. (2023). Risk Identification (What is it, techniques and examples). IT PM School. https://itpmschool.com/risk-identification/
  46. Panigrahi, R., Borah, S., Bhoi, A. K., & Mallick, P. K. (2020). Intrusion Detection Systems (IDS) – An Overview with a Generalized Framework. Cognitive Informatics and Soft Computing, 107 – 117. doi: 10.1007/978-981-15-1451-7_11
  47. P&L Law (2018). Security Measures for Protection of Personal Data (Rule VI): Data Privacy Act. https://pnl-law.com/blog/security-measures-for-protection-of-personal-data-rule-vi-data-privacy-act/
  48. Proag, V. (2020). Economic and Social Aspects of Infrastructure. Infrastructure Planning and Management: An Integrated Approach, 185 – 218. doi: 10.1007/978-3-030-48559-7_7
  49. Protective Security Requirements [PSR] (2018). Deter, Detect, Delay, Respond, Recover. https://www.protectivesecurity.govt.nz/physical-security/lifecycle/design/apply-good-practices/deter-detect-delay-respond-recover/
  50. Protective Security Requirements [PSR] (2022, May 01). Alarm systems. https://www.protectivesecurity.govt.nz/physical-security/lifecycle/design/specific-security-measures/alarm-systems/
  51. Ralph (2021). What is Physical Security? Definition and Concepts. United Locksmith. https://unitedlocksmith.net/blog/what-is-physical-security-definition-and-concepts
  52. Resolver (2018). Physical and Cybersecurity Defense: how Hybrid Attacks are Raising the Stakes. https://www.resolver.com/blog/physical-and-cybersecurity-defense-hybrid-attacks/
  53. RiskOptics (2023). What are the 3 Types of Internal Controls? https://reciprocity.com/resources/what-are-the-3-types-of-internal-controls/
  54. Sanghavi, A. (2022). Physical Security: What It is and Why You Should Care. https://www.g2.com/articles/physical-security
  55. Security (2022). Physical security incidents increase during the pandemic. https://www.securitymagazine.com/articles/97021-physical-security-incidents-increase-during-the-pandemic
  56. Security Hire Melbourne (2023). The importance of security guards in today’s society. Medium. https://medium.com/@stevesec.hire/the-importance-of-security-guards-in-todays-society-2ba5d67f66d1
  57. Security Training (2023). How do you conduct a physical security risk assessment for your facility? LinkedIn. https://www.linkedin.com/advice/0/how-do-you-conduct-physical-security-risk-assessment#:~:text=A%20physical%20security%20risk%20assessment%20is%20a%20systematic,measures%20to%20protect%20your%20people%2C%20property%2C%20and%20information.
  58. Shaikh, H. (2018). The importance of physical security in the workplace. Infosec. https://resources.infosecinstitute.com/topic/importance-physical-security-workplace/
  59. Sharma, K. (2023). Intrusion Detection System (IDS): Types, techniques, and Applications. Knowledge Hut. https://www.knowledgehut.com/blog/security/intrusion-detection-system
  60. Sirisilla, S. (2023). Qualitative Vs. Quantitative Research – A step-wise guide to conduct research. Enago Academy. https://www.enago.com/academy/qualitative-vs-quantitative-research/
  61. Sprout Solutions (2018). The Data Privacy Act (RA 10173): Here’s What You Need to Know. https://sprout.ph/blog/data-privacy-act/
  62. Steiner, E.D., Philips, A. Moore, P., Jackson, B., & Augustine C. (2021). Challenges in implementing physical security measures in K-12 schools. https://www.rand.org/pubs/research_reports/RRA1077-2.html
  63. Swinhoe, D. (2021, August 4). What is physical security? How to keep your facilities and devices safe from on-site attackers. CSO. https://www.csoonline.com/article/3324614/what-is-physical-security-how-to-keep-your-facilities-and-devices-safe-from-on-site-attackers.html
  64. Thangavelu, M., Krishnaswamy, V., & Sharma, M. (2021). Impact of comprehensive information security awareness and cognitive characteristics on security incident management – an empirical study. Computers & Security, 109, 102401. doi: 10.1016/j.cose.2021.102401
  65. The Indeed Editorial Team (2021). 16 process metrics to track | indeed.com. https://www.indeed.com/career-advice/careerdevelopment/process-metrics
  66. Tunggal, A. T. (2023). What is a Vulnerability Assessment? And How to Conduct One. UpGuard. https://www.upguard.com/blog/vulnerability-assessment
  67. Unisys (2019). The Philippines shows the highest level of concern over security issues; one in five Filipinos have stopped dealing with an organization after a data breach-new Unisys security index. https://www.unisys.com/news-release/ph-the-philippines-shows-the-highest-level-of-concern/
  68. United Nations. (n.d.). The Philippines at a glance. un.int/philippines/philippines/philippines-glance#:~:text=The%20Philippines%20is%20located%20in,port%20of%20entry%20is%20Manila.
  69. Urhuogo-Idierukevbe, I., Addo, A., Anderson, T. L., & Khan, F. M. (2019). Physical security best practices. Journal of Physical Security, 12(3), 15 – 29. https://rbsekurity.com/JPS%20Archives/JPS%2012(3).pdf
  70. Villanueva, M. S. (2022). Security Incident or Data Breach: What’s the Difference? Intelligent Technical Solutions. https://www.itsasap.com/blog/security-incident-vs-breach
  71. WheelhouseIT (2022, August 8). The importance of physical security. https://www.wheelhouseit.com/the-importance-of-physical-security/
  72. Woods, M. (2019). Practical tools for the identification of risk (and opportunity). IIRSM. https://www.iirsm.org/news/practical-tools-identification-risk-and-opportunity
  73. Zulueta, M. (2019). The Philippines is named the world’s most dangerous country…but is it really? When in Manila. https://www.wheninmanila.com/the-philippines-is-named-the-worlds-most-dangerous-country-but-is-it-really/

Various challenges have been identified when it comes to the physical security practices being implemented in the area. In terms of access control, the main issue comes in dealing the people, including employees, who are trying to access important systems or information without permission. On the other hand, when it comes to security assessment, the main problem is keeping up with online threats that constantly change from time to time. This study evaluates physical security practices, focusing on access control, security assessment, and surveillance, to determine their effectiveness in ensuring safety. The findings reveal high overall satisfaction with security measures, scoring an average, particularly for identification protocols and ID management. Security assessment practices also received a lower rating of underscoring the need for enhancement. The demographic profile of respondents shows a predominantly young workforce, with most aged 25-34 and a balanced gender distribution. The majority of respondents have significant work experience, while educational levels vary, with a notable proportion having some college education. This suggests a generally experienced and diverse workforce. Clients report high satisfaction with security measures, especially advanced locks, effective lighting, and video surveillance. Nevertheless, improvements are needed in entrance point security and perimeter surveillance. The study finds no significant impact of age, gender, length of service, or education on security practices, indicating uniform training and organizational culture as evidenced by the non-significant differences. To address the identified issues, an action plan is developed based on best practices. This plan includes recommendations for enhancing training programs, upgrading access control systems, implementing regular security audits, and improving communication channels for feedback. This structured approach aims to refine security practices and ensure continuous improvement in response to evolving security challenges. Lastly, for the surveillance and monitoring aspects, maintaining protection and privacy is still one of the main concerns as it involves protecting everyone’s privacy. Adopting a comprehensive security approach is recommended based on the indicated issues in physical security practice.

Keywords : Client Satisfaction, Physical Security, Model of Best Practice.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe